2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afsconfig.h>
12 #include "afs/param.h"
14 #include <afs/param.h>
19 #include "afs/sysincludes.h"
20 #include "afsincludes.h"
22 #include "afs/pthread_glock.h"
25 #include "afs/cellconfig.h"
28 #include "afs/pthread_glock.h"
30 #include "des_prototypes.h"
31 #else /* defined(UKERNEL) */
33 #include <afs/pthread_glock.h>
34 #include <sys/types.h>
40 #include <netinet/in.h>
46 #include <des_prototypes.h>
49 #include "cellconfig.h"
52 #endif /* defined(UKERNEL) */
54 /* return a null security object if nothing else can be done */
56 QuickAuth(struct rx_securityClass **astr, afs_int32 *aindex)
58 register struct rx_securityClass *tc;
59 tc = rxnull_NewClientSecurityObject();
66 /* Return an appropriate security class and index */
68 afsconf_ServerAuth(void *arock,
69 struct rx_securityClass **astr,
72 struct afsconf_dir *adir = (struct afsconf_dir *) arock;
73 register struct rx_securityClass *tclass;
76 tclass = (struct rx_securityClass *)
77 rxkad_NewServerSecurityObject(0, adir, afsconf_GetKey, NULL);
80 *aindex = 2; /* kerberos security index */
88 #endif /* !defined(UKERNEL) */
91 GenericAuth(struct afsconf_dir *adir,
92 struct rx_securityClass **astr,
97 struct ktc_encryptionKey key, session;
98 struct rx_securityClass *tclass;
101 register afs_int32 code;
103 /* first, find the right key and kvno to use */
104 code = afsconf_GetLatestKey(adir, &kvno, &key);
106 return QuickAuth(astr, aindex);
109 /* next create random session key, using key for seed to good random */
110 des_init_random_number_generator(ktc_to_cblock(&key));
111 code = des_random_key(ktc_to_cblock(&session));
113 return QuickAuth(astr, aindex);
116 /* now create the actual ticket */
117 ticketLen = sizeof(tbuffer);
118 memset(tbuffer, '\0', sizeof(tbuffer));
120 tkt_MakeTicket(tbuffer, &ticketLen, &key, AUTH_SUPERUSER, "", "", 0,
121 0xffffffff, &session, 0, "afs", "");
122 /* parms were buffer, ticketlen, key to seal ticket with, principal
123 * name, instance and cell, start time, end time, session key to seal
124 * in ticket, inet host, server name and server instance */
126 return QuickAuth(astr, aindex);
129 /* Next, we have ticket, kvno and session key, authenticate the connection.
130 * We use a magic # instead of a constant because of basic compilation
131 * order when compiling the system from scratch (rx/rxkad.h isn't installed
133 tclass = (struct rx_securityClass *)
134 rxkad_NewClientSecurityObject(enclevel, &session, kvno, ticketLen,
137 *aindex = 2; /* kerberos security index */
141 /* build a fake ticket for 'afs' using keys from adir, returning an
142 * appropriate security class and index
145 afsconf_ClientAuth(void *arock, struct rx_securityClass ** astr,
148 struct afsconf_dir * adir = (struct afsconf_dir *) arock;
152 rc = GenericAuth(adir, astr, aindex, rxkad_clear);
157 /* build a fake ticket for 'afs' using keys from adir, returning an
158 * appropriate security class and index. This one, unlike the above,
159 * tells rxkad to encrypt the data, too.
162 afsconf_ClientAuthSecure(void *arock,
163 struct rx_securityClass **astr,
166 struct afsconf_dir *adir = (struct afsconf_dir *) arock;
170 rc = GenericAuth(adir, astr, aindex, rxkad_crypt);
176 * Build a security class from the user's current tokens
178 * This function constructs an RX security class from a user's current
181 * @param[in] info The cell information structure
182 * @param[in] flags Security flags describing the desired mechanism
183 * @param[out] sc The selected security class
184 * @param[out] scIndex The index of the selected class
185 * @parma[out] expires The expiry time of the tokens used to build the class
187 * Only the AFSCONF_SECOPTS_ALWAYSENCRYPT flag will modify the behaviour of
188 * this function - it determines whether a cleartext, or encrypting, security
192 * 0 on success, non-zero on failure. An error code of
193 * AFSCONF_NO_SECURITY_CLASS indicates that were were unable to build a
194 * security class using the selected tokens.
198 afsconf_ClientAuthToken(struct afsconf_cell *info,
199 afsconf_secflags flags,
200 struct rx_securityClass **sc,
204 struct ktc_principal sname;
205 struct ktc_token ttoken;
212 strcpy(sname.cell, info->name);
213 sname.instance[0] = 0;
214 strcpy(sname.name, "afs");
215 code = ktc_GetToken(&sname, &ttoken, sizeof(ttoken), NULL);
218 /* XXX - We should think about how to handle this */
219 if (ttoken.kvno < 0 || ttoken.kvno > 256) {
221 "funny kvno (%d) in ticket, proceeding\n",
224 if (flags & AFSCONF_SECOPTS_ALWAYSENCRYPT)
225 encryptLevel = rxkad_crypt;
227 encryptLevel = rxkad_clear;
228 *sc = rxkad_NewClientSecurityObject(encryptLevel,
235 *expires = ttoken.endTime;
238 return AFSCONF_NO_SECURITY_CLASS;
244 * Build a set of security classes suitable for a server accepting
245 * incoming connections
247 #if !defined(UKERNEL)
249 afsconf_BuildServerSecurityObjects(struct afsconf_dir *dir,
251 struct rx_securityClass ***classes,
252 afs_int32 *numClasses)
254 if (flags & AFSCONF_SEC_OBJS_RXKAD_CRYPT)
259 *classes = calloc(*numClasses, sizeof(**classes));
261 (*classes)[0] = rxnull_NewServerSecurityObject();
262 (*classes)[1] = NULL;
263 (*classes)[2] = rxkad_NewServerSecurityObject(0, dir,
264 afsconf_GetKey, NULL);
265 if (flags & AFSCONF_SEC_OBJS_RXKAD_CRYPT)
266 (*classes)[3] = rxkad_NewServerSecurityObject(rxkad_crypt, dir,
267 afsconf_GetKey, NULL);
272 * Pick a security class to use for an outgoing connection
274 * This function selects an RX security class to use for an outgoing
275 * connection, based on the set of security flags provided.
278 * The configuration directory structure for this cell. If NULL,
279 * no classes requiring local configuration will be returned.
281 * A set of flags to determine the properties of the security class which
283 * - AFSCONF_SECOPTS_NOAUTH - return an anonymous secirty class
284 * - AFSCONF_SECOPTS_LOCALAUTH - use classes which have local key
285 * material available.
286 * - AFSCONF_SECOPTS_ALWAYSENCRYPT - use classes in encrypting, rather
287 * than authentication or integrity modes.
288 * - AFSCONF_SECOPTS_FALLBACK_NULL - if no suitable class can be found,
289 * then fallback to the rxnull security class.
291 * The cell information structure for the current cell. If this is NULL,
292 * then use a version locally obtained using the cellName.
293 * @param[in] cellName
294 * The cellName to use when obtaining cell information (may be NULL if
297 * The selected security class
298 * @param[out] scIndex
299 * The index of the selected security class
300 * @param[out] expires
301 * The expiry time of the tokens used to construct the class. Will be
302 * NEVER_DATE if the class has an unlimited lifetime. If NULL, the
303 * function won't store the expiry date.
306 * Returns 0 on success, or a com_err error code on failure.
309 afsconf_PickClientSecObj(struct afsconf_dir *dir, afsconf_secflags flags,
310 struct afsconf_cell *info,
311 char *cellName, struct rx_securityClass **sc,
312 afs_int32 *scIndex, time_t *expires) {
313 struct afsconf_cell localInfo;
321 if ( !(flags & AFSCONF_SECOPTS_NOAUTH) ) {
323 return AFSCONF_NOCELLDB;
325 if (flags & AFSCONF_SECOPTS_LOCALAUTH) {
326 code = afsconf_GetLatestKey(dir, 0, 0);
330 if (flags & AFSCONF_SECOPTS_ALWAYSENCRYPT)
331 code = afsconf_ClientAuthSecure(dir, sc, scIndex);
333 code = afsconf_ClientAuth(dir, sc, scIndex);
339 *expires = NEVERDATE;
342 code = afsconf_GetCellInfo(dir, cellName, NULL, &localInfo);
348 code = afsconf_ClientAuthToken(info, flags, sc, scIndex, expires);
349 if (code && !(flags & AFSCONF_SECOPTS_FALLBACK_NULL))
352 /* If we didn't get a token, we'll just run anonymously */
357 *sc = rxnull_NewClientSecurityObject();
360 *expires = NEVERDATE;